Showing results 1 to 20 of 157

February 25, 2013 By Gajen Sunthara


App lists security related software flaws from the National Vulnerability Database (NVD). App is extremely useful for any IT security...

March 6, 2013 by

Child-proofing your iPad/iPad mini/iPhone

We tech types put elaborate systems in place to prevent hackers from infiltrating out digital kingdoms, but we give little thought — or preparation — to what an innocent-looking toddler can do to our iPads, and the software and data they hold.

October 30, 2012 By SimpleSiteAudit

Simple Site Audit MultiSite

Combat the hackers with 'Simple Site Audit Multisite' website protection. With SSAM installed, you will be notified by email of any...

September 29, 2011 by

Hire hackers to catch other hackers?

Leading tech companies have long used 'ethical hackers' to help probe vulnerabilities in their systems and software. Should some of the not-so-ethical hackers be added to payrolls as well?

July 16, 2011 by

Apple patches iOS security vulnerability

Apple has dealt with a flaw in its iOS software that could allow hackers to hijack the devices.The flaw, which was fixed on Friday, was used for jailbreaking iOS devices such as iPads and iPhones.

June 17, 2011 by

Homeland Security warns of China software threat

The Department of Homeland Security has issued a warning after a security researcher discovered software from a Chinese company contained bugs which hackers could exploit to launch attacks on critical infrastructure including utilities.

October 18, 2010 by

Adobe's Acrobat X factors in security, collaboration

The company has sandboxed the PDF Reader to stop malicious hackers from exploiting potential weaknesses in the software, as well as adding new online services and announcing the upcoming launch of Windows Phone 7 and BlackBerry 6 apps

April 22, 2010 by

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software---we all do---you need to keep tabs on the latest vulnerabilities.

April 13, 2010 by

Relax: Conroy's filter can be safely ignored

After years of spruiking Australia's so-called "mandatory" internet filter comes the revelation, from no less than Stephen Conroy, that it is in fact optional: anybody who wants to circumvent the filter is free to do so without penalty. One might ask: what, then, is the point of this whole expensive exercise?

March 30, 2010 by

iPad hacks for fun and profit

Software and Hardware hackers will view the iPad as the latest vehicle for their collective cracking genius. What sort of Apple-unauthorized gifts can we expect to see from our underground friends?

March 7, 2010 by

Energizer Bunny out to PWN your PC!

According to research carried out by US-CERT (United States Computer Emergency Readiness Team), software that comes with the Energizer DUO USB NiMH battery charger is infected with a Trojan horse that gives hackers access to Windows PCs.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular